Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-67344

Publication date:
12/12/2025
jshERP v3.5 and earlier is affected by a stored Cross Site Scripting (XSS) vulnerability via the /msg/add endpoint.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-65530

Publication date:
12/12/2025
An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit before v32.7.4 allows attackers to overwrite arbitrary files as root via scanning a crafted file.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-53960

Publication date:
12/12/2025
When encrypting sensitive data, weak encryption keys that are fixed or directly generated based on user passwords are used. Attackers can obtain these keys through methods such as reverse engineering, code leaks, or password guessing, thereby decrypting stored or transmitted encrypted data, leading to the leakage of sensitive information.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> This issue affects Apache StreamPark: from 2.0.0 before 2.1.7.<br /> <br /> Users are recommended to upgrade to version 2.1.7, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-65854

Publication date:
12/12/2025
Insecure permissions in the scheduled tasks feature of MineAdmin v3.x allows attackers to execute arbitrary commands and execute a full account takeover.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-66430

Publication date:
12/12/2025
Plesk 18.0 has Incorrect Access Control.
Severity CVSS v4.0: Pending analysis
Last modification:
12/12/2025

CVE-2025-14567

Publication date:
12/12/2025
A weakness has been identified in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This affects an unknown function of the file /api/employees. Executing manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
Severity CVSS v4.0: MEDIUM
Last modification:
12/12/2025

CVE-2025-12843

Publication date:
12/12/2025
Code Injection using Electron Fuses in waveterm on MacOS allows TCC Bypass.<br /> This issue affects waveterm: 0.12.2.
Severity CVSS v4.0: MEDIUM
Last modification:
12/12/2025

CVE-2025-13733

Publication date:
12/12/2025
BuhoNTFS contains an insecure XPC service that allows local, unprivileged users to escalate their privileges to root via insecure functions.This issue affects BuhoNTFS: 1.3.2.
Severity CVSS v4.0: HIGH
Last modification:
12/12/2025

CVE-2025-14565

Publication date:
12/12/2025
A vulnerability was identified in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The affected element is an unknown function of the file /Profilers/SProfile/login1.php. Such manipulation of the argument Username leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.
Severity CVSS v4.0: MEDIUM
Last modification:
12/12/2025

CVE-2025-14566

Publication date:
12/12/2025
A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.
Severity CVSS v4.0: MEDIUM
Last modification:
12/12/2025

CVE-2025-36744

Publication date:
12/12/2025
SolarEdge SE3680H has unauthenticated disclosure of sensitive information during the bootloader loop. While the device repeatedly initializes and waits for boot instructions, the bootloader emits diagnostic output this behavior can leak operating system information.
Severity CVSS v4.0: LOW
Last modification:
12/12/2025

CVE-2025-36745

Publication date:
12/12/2025
SolarEdge SE3680H  ships with an outdated Linux kernel containing unpatched vulnerabilities in core subsystems. An attacker with network or local access can exploit these flaws to achieve remote code execution, privilege escalation, or disclosure of sensitive information.
Severity CVSS v4.0: HIGH
Last modification:
12/12/2025